QHx Manager
Supervises the cluster and reconciles QHx policy, proxy configuration, and supporting resources.
// Platform
QHx composes workload identity, policy-bound communication, and request notarization into one runtime path.
001 · What changes
QHx evaluates workload, node, flow, and request context before the exchange proceeds.
A secret proves possession. QHx identity is bound to a workload and the node on which it runs.
Authorization follows workload identity, labels, policy, and flowspecs—not merely IP adjacency.
Notarized requests can be verified after the short-lived SVID that created them has expired.
002 · Composition
Supervises the cluster and reconciles QHx policy, proxy configuration, and supporting resources.
Issues workload-bound credentials, including X.509-SVIDs, from node and workload attestation.
Gates identity issuance using policy and, when enabled, TPM-backed platform evidence.
Mediates application traffic and carries it through mutually authenticated, encrypted workload tunnels.
Creates long-lived, offline-verifiable receipts from selected workload requests and responses.
Gives operators a direct interface for installation, inspection, and administration.
003 · Deployment
QHx Core deploys through Helm into Kubernetes environments on premises, in cloud regions, or at the edge. The operating model is broader: identity and policy attach to workloads and nodes instead of a single scheduler, network, or CPU architecture.
// Platform
Identity, posture, policy, and evidence become part of the same decision path. The threat model behind those choices is published in full.